VI
TU
A global corporation has faced numerous cyber threats and is now prioritizing the
security of its servers. The corporation's IT security expert recommends a strategy to
improve server security. Which of the following options is likely to be the MOST
effective? - ANSWER D. Implement a secure baseline, consistently apply updates
IS
and patches, and adhere to hardening guidelines.
A software engineer is reviewing the various capabilities of automation and scripting.
M
What capability does the use of security groups allow for in automation and scripting? -
ANSWER A. It assists in reducing the possibility of unauthorized access or
excessive permissions.
O
As a company matures, its attack surface also grows. Additionally, the company
A
becomes an increasingly desirable target for a malicious actor to compromise its
systems. A company must monitor all software usage, secure applications, third-party
software, libraries, and dependencies. Which of the following would contribute to
N
protecting the business's operations? (Select the three best options.) - ANSWER A.
Package monitoring
JP
B. Software Bill of Materials
C. Software composition analysis
A forensic analyst at an international law enforcement agency investigates a
sophisticated cyber-espionage case. The analyst must uncover the timeline of
document interactions, detect concealed or system-protected files, interpret categories
of digital events, and trace digital breadcrumbs left behind during media uploads on
, social platforms. What combination of data sources would provide the MOST
comprehensive information for this multifaceted investigation? - ANSWER C. File
metadata with extended attributes and network transaction logs
The IT team of a medium-sized business is planning to enhance network security. They
want to enforce minimum security controls and configurations across all network
devices, including firewalls, routers, and switches. What should they establish to
achieve this objective? - ANSWER A. Network security baselines
A
An organization needs to implement web filtering to bolster its security. The goal is to
ensure consistent policy enforcement for both in-office and remote workers. Which of
VI
the following web filtering methods BEST meets this requirement? - ANSWER B.
Deploying agent-based web filtering
TU
In a multinational corporation, employees across various departments regularly access
many cloud-based applications to fulfill their tasks efficiently. The company's security
team is grappling with managing user credentials securely and efficiently across these
diverse platforms. They are actively looking to improve user authentication and
IS
streamline access to these applications while ensuring robust security measures are in
place. In this scenario, what technology should the company implement to enable
Single Sign-On (SSO) capabilities and ensure secure authentication across its diverse
cloud-based applications? - ANSWER B. SAML
M
A cybersecurity responder monitors a hacker's activities covertly to prepare a
O
containment and eradication plan. This technique involves gaining an informational
advantage over an adversary by observing them without their knowledge, allowing for
strategic planning and response. What threat-hunting technique is being employed? -
A
ANSWER B. Maneuvering
N
What action of the incident response process limits the scope and magnitude of the
incident? - ANSWER C. Containment
JP
An information security manager is fine-tuning a Security Information and Event
Management (SIEM) system in a company that has recently reported a series of
unauthorized account access attempts. The manager wants to ensure prompt detection
of similar incidents for immediate investigation. Which approach should the manager
consider to optimize the system's alerting capability? - ANSWER C. Configuring the
SIEM system to alert when multiple login failures for the same account occur within a
specified time period
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller JPNAOMISTUVIA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.